• Title/Summary/Keyword: 지문인증

Search Result 254, Processing Time 0.033 seconds

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.

An Application of Phase-Only-Correlation to Fingerprint Identification (위상한정상관법의 지문인증에의 적용)

  • 이충호;서덕범
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.134-136
    • /
    • 2003
  • This paper proposes an algorithm for fingerprint identification using phase only correlation. This algorithm uses the phase of fast Fourier transform and correlation function to calculate the similarity. The algorithm gives very clear result for identification because it shows only one conspicuous sharp peak for the same person's fingerprint. Further, it shows good results even for the finger print images which are printed not clearly and does not need to preprocess the images. It also shows good results for parallel displacement of fingerprint. The experiment result shows the effectiveness of the proposed algorithm.

  • PDF

FingerPrint Verification System Using Core Centered Ridge Frequency Validation (중심점 기준의 융선추적 검증을 이용한 지문 인증 시스템)

  • Jo, Youngwoo;Jo, Byungho;Yoo, Kee-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1103-1106
    • /
    • 2004
  • Window Frame 방향성 추출법을 보완한 Extended Window Frame을 제시하고, 높은 보완성을 필요로 하는 곳에 사용할 수 있도록 하기 위해서 지문의 중심점으로부터 매칭 된 각각의 특징점까지 이르는 선상에 있는 융선을 추적하는 방법을 이용한 검증 방법을 제안한다. 제안된 검증 방법의 성능을 비교하기 위해서 방향성을 추출하는 방법, 특징점을 추출하는 방법을 기존의 여러 가지 방법들로 구현하고 그 결과를 비교, 분석한다.

  • PDF

A study on the Web Standard Modules (Non-ActiveX) based on Secure Banking Transactions (웹 표준 모듈(Non-ActiveX)기반 한 안전한 은행거래를 위한 연구)

  • Nam, Ki-Bok;Park, Koo-Rack;Kim, Jae-Woong;Lee, Yun-Yeol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.243-244
    • /
    • 2016
  • 은행거래를 하려면 Active X를 기반으로 하는 보안 통합설치프로그램, 공인인증 보안프로그램, 개인 PC방화벽 프로그램 등 보안에 필요한 프로그램을 설치해야한다. 그러나 Active X의 보안취약점으로 앞으로 나올 브라우저에서는 Active X대신 웹 표준 모듈을 기반으로 하는 보안 시스템을 제공하고 있다. 본 논문은 Active X를 대체할 수 있는 것으로 웹 표준 모델에 근거한 QR코드 및 지문인식을 통한 인증을 제안한다. 본 논문에서 제안한 시스템을 적용한다면, 보다 안전한 은행거래를 하는데 도움을 줄 수 있다.

  • PDF

A Review of Biometric authentication using Fingerprint (지문을 이용한 생체 인증방식의 동향)

  • Kim, Hyung-Kyun;Hwang, Jung-Yeon;Kim, Soo-hyung;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.230-233
    • /
    • 2017
  • 최근 기존에 사용하던 패스워드, PIN의 취약성으로 인해 개인정보 유출, 도난 등 다양한 문제가 발생하고 있다. 이를 대체할 목적으로 사람의 신체를 이용한 바이오 인증 기술이 떠오르고 있으며, 많은 연구를 거치고 있다. 그러나 사람의 바이오 정보는 외부에 노출 될 시, 이를 복구할 방법이 없기 때문에 개인정보 보호가 필수적이다. 본 논문에서는 바이오 인식 기술 중 지문을 기반으로 사용자 매칭 기법과 개인 프라이버시 보호를 위한 템플릿 구성방법에 대한 동향을 살펴본다.

WWW based on Missing-Child Prevention System Construction using Fingerprint (WWW 기반 지문을 이용한 미아방지시스템 구축)

  • 송영옥;김성영;조용환
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.2
    • /
    • pp.64-72
    • /
    • 2002
  • In this paper, the aims are to develop convenient and safe system-solutions, looking for missing-child, which is one of the increasing social problems, on the basis of World Wide Web. Finger-print cognition has been researching from long time before, as well as Bio-cognition technology, which is adapted for private-cognition in the field of human-cognition. By the fingerprint cognition, which discern finger print, which is generally used in Bio-cognition and is characterized each by using image-processing, missing-child protection system on the basis of Word Wide Web is designed and implemented in this paper. Additionally, indicates plans for revitalization method of this system.

  • PDF

An Mobile-OTP(One Time Password) Key and Simulation using Fingerprint Features (지문 특징을 이용한 모바일 일회용 암호키 및 시뮬레이션)

  • Cha, Byung-Rae;Kim, Yong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.4
    • /
    • pp.532-543
    • /
    • 2009
  • As the applications within Internet and Ubiquitous becoming more extensive, the security issues of those applications are appearing to be the most important concern. Therefore, every part of the system should be thoroughly designed and mutually coordinated in order to support overall security of the system. In this paper, we propose new technique which uses the fingerprint features in order to generate Mobile One Time Passwords(OTPs). Fingerprint is considered to be one of the powerful personal authentication factors and it can be used for generating variable passwords for one time use. Also we performed a simulation of homomorphic graph variable of fingerprint feature point using dendrogram and distribution of fingerprint feature points for proposed password generation method.

  • PDF

CMOS Integrated Capacitive Fingerprint Sensor with Pixel-level Auto Calibration Circuit (픽셀단위 자동보상회로가 적용된 용량형 지문센서의 CMOS구현)

  • Jung, Seung-Min
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.3 s.357
    • /
    • pp.65-71
    • /
    • 2007
  • We propose a pixel-level automatic calibration circuit scheme that initializes a capacitive fingerprint sensor LSI to eliminate the influence of the surface condition and environment, which is degraded by dirt during long-time use, process variation and ambient temperature. The sample chip is fabricated on $0.35{\mu}m$ standard CMOS process. The calibration is executed by optimizing the reference voltage in each pixel to make the sensor signals of all pixels the same. The calibration control circuit is composed of the sensing circuit and charge pumping circuit, and calibrates all pixels in a short time. 16-level gray scale fingerprint images can be captured to increase the accuracy of identification. This confirms that the scheme is effective for capturing consistent clear images during long-time use.

A Fingerprint_based User Authentication Protocol for Wireless LAN Environment (무선랜 환경에서의 지문을 이용한 사용자 인증 프로토콜)

  • Jung Seung-Hwan;Lee Sung-Ju;Shin Hyun-Sup;Chung Yong-Wha;Kim Tae-Sup;Oh Ryong;Cho Choong-Ho;Lee Nam-Il
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.258-261
    • /
    • 2006
  • 네트워크 기술이 발전함에 따라 유/무선 네트워크가 통합되기 시작하였고, 궁극적으로 언제/어디서나 컴퓨터를 사용한 수 있는 유비쿼터스 컴퓨팅 시대가 도래 할 것으로 예상된다. 최근에는 공공장소에서 고속의 무선 인터넷 접속에 대한 욕구가 커지면서 무선랜에 대한 관심이 많아지고 있다. 무선랜 환경에서 중요한 보안문제 중 하나는 승인된 사용자에게만 접속을 허용하는 것이다. 특히, 유선 네트워크와 다르게 무선 네트워크 환경에서는 Access Point(AP)가 설치되어 있는 곳이면 누구나 깁게 AP를 통해 네트워크를 이용할 수 있기 때문에 접속에 관한 보안의 중요성이 강조되고 있다. 본 논문에서는 무선랜 환경에서 안전하게 사용자를 인증하고 서비스를 제공하기 위해 지문을 이용한 사용자 인증 프로토콜을 제안한다.

  • PDF

Android Application Code Protection Scheme Using Fingerprint Authentication and Dynamic Loading (지문 인증과 동적 로딩을 이용한 안드로이드 애플리케이션 코드 보호 기법)

  • Lyoo, Hwahn-il;Suk, Jae-Hyuk;Park, Jin-Hyung;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1361-1372
    • /
    • 2017
  • If an external attacker takes from a victim's smartphone a copy of a secret application or an application to which fingerprinting technique is applied, secret information can be leaked or the legitimate user can be misunderstood as an illegal redistributor, which results in a serious security problem. To solve this problem, this paper proposes an Android application code protection scheme using fingerprint authentication and dynamic loading. The proposed scheme divides one application into CLR(Class LoadeR) and SED(SEperated Dex). CLR is an APK file with the ability to dynamically load the SED, and the SED is a file containing the classes required to run the application. The SED is stored inside the smartphone after being encrypted, and the SED can be decrypted only if the user is successfully authenticated using his or her fingerprint. The proposed scheme can protect the application code from the attacker who physically acquired user's smartphone.